¶íÂÞ˹ºÚ¿Í¹¥»÷²¨À¼Õþ¸®»ú¹¹Ðû²¼Óйر±Ô¼ÑÝϰÐéαÐÅÏ¢£»£»£»£»£»£»Ë¼¿ÆÎªCMLºÍVIRL-PEÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´SaltStack¿ò¼ÜÎó²î

Ðû²¼Ê±¼ä 2020-06-01

1.¶íÂÞ˹ºÚ¿Í¹¥»÷²¨À¼Õþ¸®»ú¹¹£¬£¬£¬£¬£¬£¬£¬Ðû²¼Óйر±Ô¼ÑÝϰÐéαÐÅÏ¢


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


²¨À¼Õþ¸®Ðû²¼¶íÂÞ˹¶ÔÆä¾ÙÐÐÁË´ó¹æÄ£µÄÍøÂç¹¥»÷£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚ¹¥»÷²¨À¼¾ü¶Ó£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÆÆËð»ªÉ³ºÍ»ªÊ¢¶ÙÖ®¼äµÄ¹ØÏµ¡£¡£ ¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÏ®»÷Á˲¨À¼µÄ¶à¸öÕ¾µã£¬£¬£¬£¬£¬£¬£¬ÔÚNiezaleznapl¡¢Olsztyn24com¡¢RadioSzzezecinpl¡¢ePoznanplµÄInternetµÈÍøÕ¾ÉÏÐû²¼Óйر±Ô¼ÑÝϰ¡°2020Ä꺴ÎÀÕßÅ·ÖÞ¡±µÄÐéαÐÅÏ¢¡£¡£ ¡£²¨À¼ÌØÊâЧÀÍÕþ¸®Ð­µ÷²¿³¤½²»°ÈËStanislav ZharinÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Õâ´Î¹¥»÷Ç¡·ê¡°º´ÎÀÕßÅ·ÖÞ2020¡±ÏÂÒ»½×¶ÎÑÝϰµÄ×îÏÈ£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÉæ¼°µ½Á˲¨À¼ÓëÃÀ¹úÖ®¼äµÄ¾üÊÂÏàÖú£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÄ¿µÄ¿ÉÄÜÊÇΪÁËÍ»ÆÆ±±Ô¼µÄͳһ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÃÀ¾üºÍ²¨À¼²½¶ÓÁªºÏµÄ¿ÉÄÜÐÔ¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.ehackingnews.com/2020/05/russian-hackers-attacked-poland-due-to.html


2.˼¿ÆÎªCMLºÍVIRL-PEÐû²¼Çå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÐÞ¸´SaltStack¿ò¼ÜÎó²î


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


˼¿ÆÐû²¼ÁËÇå¾²¸üУ¬£¬£¬£¬£¬£¬£¬ÒÔÐÞ¸´Cisco Modeling LabsÆóÒµ°æ£¨CML£©ºÍÐéÄâInternet·ÓÉʵÑéÊÒСÎÒ˽¼Ò°æ£¨VIRL-PE£©ÖÐSaltStack¿ò¼ÜÎó²î£¬£¬£¬£¬£¬£¬£¬Ô¶³Ì¹¥»÷Õß¿ÉÒÔʹÓÃÕâЩÎó²îÀ´¿ØÖÆÏµÍ³¡£¡£ ¡£´Ë´Î²¹¶¡ÐÞ¸´ÁËÉí·ÝÑéÖ¤ÈÆ¹ýÎó²î£¨CVE-2020-11651£©£¬£¬£¬£¬£¬£¬£¬ËüÔÊÐíÔ¶³ÌÓû§ÔÚ²»¾ÙÐÐÉí·ÝÑéÖ¤µÄÇéÐÎÏ»á¼ûmethods£¬£¬£¬£¬£¬£¬£¬²¢¿ÉÒÔ´Ósalt master»òsalt minionsÉÏÔËÐÐí§ÒâÏÂÁîÀ´¼ìË÷Óû§ÁîÅÆ¡£¡£ ¡£»£»£»£»£»£ÉÐÓÐĿ¼±éÀúÎó²î£¨CVE-2020-11652£©£¬£¬£¬£¬£¬£¬£¬ÆäÔÊÐí¾­ÓÉÉí·ÝÑéÖ¤µÄÓû§¾ÙÐÐí§ÒâĿ¼»á¼û¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.us-cert.gov/ncas/current-activity/2020/05/29/cisco-releases-security-updates-cml-and-virl-pe


3.ÃÀ¹úÌú·¹«Ë¾AmtrakÔâµ½ÈëÇÖµ¼ÖÂÆäÓû§ÐÅϢй¶


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ÃÀ¹ú¹ú¼ÒÌú·Óο͹«Ë¾AmtrakÓÚ4ÔÂ16ÈÕÍíÉÏÈ·¶¨ÓÐδ֪µÄµÚÈý·½¶ÔÆäÓû§µÄÕÊ»§¾ÙÐÐδ¾­ÊÚȨµÄ»á¼û£¬£¬£¬£¬£¬£¬£¬µ¼ÖÂijЩGuest Rewards»áÔ±µÄСÎÒ˽¼ÒÐÅϢй¶¡£¡£ ¡£¸Ã¹«Ë¾µÄÇå¾²ÍŶÓÔÚ¼ì²âµ½ÈëÇÖºóµÄ¼¸¸öСʱÄÚ£¬£¬£¬£¬£¬£¬£¬±ã½ÓÄÉÁËÏìÓ¦²½·¥£¬£¬£¬£¬£¬£¬£¬×èÖ¹Á˺ڿ͵Ļá¼û£¬£¬£¬£¬£¬£¬£¬Ö®ºóÖØÖÃÁËGuest RewardsÕÊ»§µÄÃÜÂ룬£¬£¬£¬£¬£¬£¬²¢ÎªÊÜÓ°ÏìÓû§ÌṩÁËΪÆÚÒ»ÄêµÄExperianµÄIdentityWorksÉí·ÝµÁÓñ£»£»£»£»£»£»¤Ð§ÀÍ¡£¡£ ¡£Amtrak¹«Ë¾²¢Î´Í¸Â¶´Ë´ÎÊÂÎñÓ°ÏìµÄÕÊ»§×ÜÊý»ò¿ÉÄÜ̻¶µÄСÎÒ˽¼ÒÐÅÏ¢ÀàÐÍ£¬£¬£¬£¬£¬£¬£¬µ«ÌåÏÖûÓÐÈκβÆÎñÊý¾Ý¡¢ÐÅÓÿ¨ÐÅÏ¢»òÉç»áÇå¾²ºÅÂëй¶¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.bleepingcomputer.com/news/security/amtrak-resets-user-passwords-after-guest-rewards-data-breach/


4.ºÚ¿Íй¶°µÍøÍйÜÌṩÉÌDaniel's HostingÊý¾Ý¿â


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÚ¿ÍÓÚ5ÔÂ31ÈÕ¹ûÕæÁË×î´óµÄÃâ·Ñ°µÍøÐ§ÀÍÍйÜÌṩÉÌDaniel's Hosting£¨DH£©µÄÊý¾Ý¿â¡£¡£ ¡£¾ÝϤ£¬£¬£¬£¬£¬£¬£¬´Ë´Îй¶±¬·¢ÔÚ½ñÄêÄêÍ·£¬£¬£¬£¬£¬£¬£¬¼´2020Äê3ÔÂ10ÈÕ£¬£¬£¬£¬£¬£¬£¬DHµÄËùÓÐÕßDaniel WinzenÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÈëÇÖÁËËûµÄÍøÕ¾²¢ÍµÈ¡ÁËËûµÄÊý¾Ý¿â£¬£¬£¬£¬£¬£¬£¬È»ºóɨ³ýÁËÆäËùÓÐЧÀÍÆ÷¡£¡£ ¡£ÔÚ¸ÃÊÂÎñ±¬·¢µÄ±¬·¢Á½Öܺ󣬣¬£¬£¬£¬£¬£¬3ÔÂ26ÈÕ£¬£¬£¬£¬£¬£¬£¬DHÓÀÊÀÐÔµØ×èÖ¹ÁËÆäЧÀÍ£¬£¬£¬£¬£¬£¬£¬²¢±Þ²ßÓû§Ç¨áãµ½ÐµİµÍøÍйÜЧÀÍÌṩÉÌ¡£¡£ ¡£´Ë´Îй¿à´×ÔºÚ¿ÍKingNull£¬£¬£¬£¬£¬£¬£¬×ß©ÁË3671¸öµç×ÓÓʼþµØµã£¬£¬£¬£¬£¬£¬£¬7205¸öÕÊ»§ÃÜÂëºÍ8580¸ö.onionÓòµÄ˽Կ¡£¡£ ¡£ÍþвÇ鱨¹«Ë¾Under BreachÆÊÎö£¬£¬£¬£¬£¬£¬£¬´Ë´Î×ß©µÄÊý¾Ý¿âÉæ¼°µ½Êýǧ¸öDarknetÓòµÄËùÓÐÕߺÍÓû§µÄÃô¸ÐÐÅÏ¢¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.zdnet.com/article/hacker-leaks-database-of-dark-web-hosting-provider/


5.ºÚ¿ÍαÔìWindowsÓÎÏ·ValorantµÄÊÖ»ú°æÒÔÈö²¥¶ñÒâÈí¼þ


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


ºÚ¿ÍαÔìRiot GamesµÄÓÎÏ·ValorantµÄÊÖ»ú°æÒÔÈö²¥¶ñÒâÈí¼þ¡£¡£ ¡£2019Äê10Ô£¬£¬£¬£¬£¬£¬£¬Riot GamesÐû²¼½«ÓÚ2020Äê6ÔÂÍÆ×ÅÃûΪValorantµÄÐÂÓÎÏ·£¬£¬£¬£¬£¬£¬£¬¸ÃÓÎÏ·¿ÉÔÚMicrosoft WindowsÉÏʹÓ㬣¬£¬£¬£¬£¬£¬ÏÖÔÚÍÆ³öÁ˲âÊ԰棬£¬£¬£¬£¬£¬£¬¾Ýͳ¼ÆÏÔʾ£¬£¬£¬£¬£¬£¬£¬ÌìÌìÓÐÁè¼Ý300ÍòÍæ¼ÒʹÓᣡ£ ¡£ºÚ¿ÍÏÖÔÚ¾ÍÔÚʹÓôËÓÎÏ·µÄÈȶȣ¬£¬£¬£¬£¬£¬£¬Íƹãð³äΪÊÖ»ú°æValorantµÄ¶ñÒⲡ¶¾£¬£¬£¬£¬£¬£¬£¬²¢ÔÚYouTubeÉÏÈö²¥¸ÃαÔìµÄÓÎÏ·µÄæÒÏ·ÌåÑ飬£¬£¬£¬£¬£¬£¬ÒÔÓÕʹÓû§ÏÂÔØ¡£¡£ ¡£´Ë´Î¹¥»÷Óм¸¸ö²î±ð°æ±¾µÄαÔìÓÎÏ·£¬£¬£¬£¬£¬£¬£¬µ«ÎÞÂÛÔõÑù£¬£¬£¬£¬£¬£¬£¬ ÔÚ×°ÖÃÓÎÏ·ºóÓû§¶¼»á±»Öض¨Ïòµ½Õ©Æ­»î¶¯ÍøÕ¾»ò×°ÖÃÆäËû¶ñÒâÓ¦Óᣡ£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/fake-mobile-game-version-valorant-malware/


6.еĴ¹Âڻ̫ͨ¹ý·¢Î±ÔìµÄAWS֪ͨ£¬£¬£¬£¬£¬£¬£¬ÇÔÈ¡Óû§Æ¾Ö¤


¼øºÚµ£±£Íø(jhdbw)¡¤×î¾ßȨÍþΨһάȨµ£±£Æ½Ì¨


Abnormal SecurityµÄÑо¿Ö°Ô±·¢Ã÷£¬£¬£¬£¬£¬£¬£¬ÔÚеĴ¹ÂڻÖУ¬£¬£¬£¬£¬£¬£¬ºÚ¿Í·Ö·¢Î±ÔìµÄAmazon Web Services£¨AWS£©Í¨Öª£¬£¬£¬£¬£¬£¬£¬Ö¼ÔÚÇÔÈ¡Óû§Æ¾Ö¤¡£¡£ ¡£Abnormal SecurityÌåÏÖ£¬£¬£¬£¬£¬£¬£¬´Ë´Î¹¥»÷»î¶¯ÓÐÐí¶à²î±ðµÄ°æ±¾£¬£¬£¬£¬£¬£¬£¬Éæ¼°²î±ðµÄ·¢¼þÈ˵ç×ÓÓʼþ¡¢¿Í»§¶ËºÍÓÐÓøºÔØ£¬£¬£¬£¬£¬£¬£¬¿ÉÊÇÓÐÒ»¸öÅäºÏµãÊÇ£¬£¬£¬£¬£¬£¬£¬ÕâЩµç×ÓÓʼþÔ´×Ôͳһ¸öÓÉ·¨¹úµÄVPNÍйÜIPµØµã¡£¡£ ¡£ÕâЩ¹¥»÷ÖеÄÿ¸öÓÐÓøºÔØÁ´½Ó¾ù»áÁ´½Óµ½Î±ÔìµÄAWSƾ֤ÇÔÈ¡ÍøÕ¾£¬£¬£¬£¬£¬£¬£¬Ò»µ©Óû§ÊäÈëÁËÆ¾Ö¤£¬£¬£¬£¬£¬£¬£¬¹¥»÷Õß½«»ñµÃ¶ÔÓû§µÄAWSÕË»§µÄ»á¼ûȨÏÞ£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÇÔÈ¡ÆäÃô¸ÐÊý¾Ý¡£¡£ ¡£


Ô­ÎÄÁ´½Ó£º

https://www.hackread.com/aws-phishing-scam-steals-aws-credentials-fake-notification/